Webcast attendees will learn key steps in the implementation an effective vulnerability management program.
Portland, Oregon (PRWEB) November 13, 2014
Tripwire, Inc., a global provider of advanced threat, security and compliance solutions, today announced a new webcast titled “Five Steps to an Effective Vulnerability Management Program.” The webcast will take place at 11:00 a.m. PST on Wednesday, November 19, 2014.
The year 2014 has been plagued by expansive, high profile zero-day exploits and vulnerabilities, including Heartbleed, Bash Shellshock, POODLE, Sandworm and others. According to the NTT Innovation Institute’s 2014 Global Threat Intelligence Report, organizations are four times more likely to be subjected to exploit kit attacks if they lack mature vulnerability management programs.
Join David Lennon, director of professional services at Lumeta, and Bryce Schroeder, senior director of systems engineering at Tripwire, for an in-depth discussion of the five most important steps for building an effective vulnerability management program.
Webcast attendees will learn key steps in the implementation an effective vulnerability management program including:
- Ensure the greatest scanning coverage for employee-owned mobile devices (BYOD) on enterprise networks.
- Intelligently prioritize vulnerabilities to reduce risk on critical systems.
- Identify, inventory and fingerprint assets.
To register for the webcast, or for additional information, please visit: http://info.tripwire.com/register-five-steps-to-effective-vulnerability-management.html#.
Tripwire is a leading provider of advanced threat, security and compliance solutions that enable enterprises, service providers and government agencies to confidently detect, prevent and respond to cybersecurity threats. Tripwire solutions are based on high-fidelity asset visibility and deep endpoint intelligence combined with business-context and enable security automation through enterprise integration. Tripwire’s portfolio of enterprise-class security solutions includes configuration and policy management, file integrity monitoring, vulnerability management and log intelligence.